Veritas Technologies LLC

United States of America

Back to Profile

1-54 of 54 for Veritas Technologies LLC Sort by
Query
Patent
World - WIPO
Excluding Subsidiaries
Aggregations Reset Report
Date
2023 1
2021 8
2020 3
2019 8
Before 2019 34
IPC Class
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result 21
G06F 3/06 - Digital input from, or digital output to, record carriers 12
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements 11
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules 6
G06F 17/30 - Information retrieval; Database structures therefor 5
See more
Found results for  patents

1.

A SYSTEM AND METHOD TO CREATE AN APPLICATION CONSISTENT RECOVERY POINT IN DISASTER RECOVERY SOLUTION WITHOUT KNOWLEDGE OF I/Os

      
Application Number US2022074359
Publication Number 2023/015148
Status In Force
Filing Date 2022-08-01
Publication Date 2023-02-09
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Aherkar, Shrijeet
  • Thakur, Vishal
  • Bandopadhyay, Tushar

Abstract

A system and method is disclosed to create an application consistent recovery point in disaster recovery solution without knowledge of I/Os. The method in one embodiment includes a first application sequentially issuing first write commands for writing data to memory via a file system. The first application receives a command to pause after issuing the first write commands. The first application pauses in response to the first application receiving the command. All of the first write commands that are pending are completed after the first application is paused. After the all the first write commands are completed, a module issues a read command to read a marker.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 16/18 - File system types

2.

OPTIMIZE BACKUP FROM UNIVERSAL SHARE

      
Application Number US2021024850
Publication Number 2021/202503
Status In Force
Filing Date 2021-03-30
Publication Date 2021-10-07
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Shuangmin
  • Zhang, Xianbo
  • Li, Shengzhao
  • Jiang, Xu
  • Wu, Weibao

Abstract

A method and apparatus is disclosed for optimized backups. In one embodiment, the method includes creating a deduplicated universal share of data objects, which in turn includes receiving a universal share of the data objects, deduplicating the universal share, wherein deduplicating the universal share includes: hashing segments of the universal share to generate respective universal share segment fingerprints; comparing the universal share segment fingerprints to fingerprints for respective segments held in deduplication storage in order to identify segments in the deduplication storage that equate to the universal share segments, respectively, of the universal share; storing identifiers that directly or indirectly identify locations, respectively, of the segments, respectively, in the deduplication storage that equate to the universal share segments, respectively, of the universal share. After creating the deduplicated universal share, a deduplicated backup of the universal share is created without reassembling the universal share from segments held in the deduplication storage, the creating the deduplicated backup including: creating a list that comprises copies of the stored identifiers, and storing the list.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

3.

SYSTEMS AND METHODS FOR PROTECTING A FOLDER FROM UNAUTHORIZED FILE MODIFICATION

      
Application Number US2021022822
Publication Number 2021/188716
Status In Force
Filing Date 2021-03-17
Publication Date 2021-09-23
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Subramanian, Narayan
  • Panna, Arindam
  • Sridharan, Srineet

Abstract

The disclosed computer-implemented method for protecting a folder from unauthorized file modification may include receiving, from a remote device, a modify request for a target file in a folder and determining whether the folder is a protected folder. The method may also include determining, in response to determining the folder is the protected folder, whether the remote device is a trusted host. The method may further include allowing, in response to determining that the remote device is the trusted host, the modify request for the target file. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

4.

METHODS AND SYSTEMS FOR DATA RESYNCHRONIZATION IN A REPLICATION ENVIRONMENT

      
Application Number US2021015384
Publication Number 2021/173293
Status In Force
Filing Date 2021-01-28
Publication Date 2021-09-02
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patil, Rushikesh
  • Thakur, Vishal

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include tracking one or more write operations executed on a target data store and sending metadata regarding the one or more write operations to a source site. The tracking comprises storing information regarding the one or more write operations in a data structure. The one or more write operations cause one or more units of data to be written to the target data store. The target data store is at a target site. The metadata comprises the information.

IPC Classes  ?

  • G06F 11/16 - Error detection or correction of the data by redundancy in hardware
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

5.

METHODS AND SYSTEMS FOR DATA RESYNCHRONIZATION IN A REPLICATION ENVIRONMENT

      
Application Number US2021015379
Publication Number 2021/173292
Status In Force
Filing Date 2021-01-28
Publication Date 2021-09-02
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patil, Rushikesh
  • Hasbe, Sunil

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include determining whether a source data store and a replicated data store are unsynchronized and, in response to a determination that the source data store and the replicated data store are unsynchronized, performing a resynchronization operation. The source data stored in the source data store is replicated to replicated data in the replicated data store. The resynchronization operation resynchronizes the source data and the replicated data.

IPC Classes  ?

  • G06F 11/16 - Error detection or correction of the data by redundancy in hardware
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

6.

SYSTEMS AND METHODS FOR AGENTLESS AND ACCELERATED BACKUP OF A DATABASE

      
Application Number US2021019346
Publication Number 2021/173620
Status In Force
Filing Date 2021-02-24
Publication Date 2021-09-02
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag

Abstract

The disclosed computer-implemented method for agentless and accelerated backup of a database may include, receiving, by a data backup device from a data server, blocks of data that provide a full backup of data of the data server. The method additionally includes receiving, by the data backup device from the data server, one or more native logs indicating one or more transactions performed by the data server. The method also includes determining, by the data backup device and based on the native logs, one or more changed blocks of the blocks of data. The method further includes providing, by the data backup device, a point in time restore of the data server by creating a synthetic full backup that overlays one or more of the blocks of data with the one or more changed blocks, and that shares remaining blocks of the blocks of data with the full backup.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

7.

METHODS AND SYSTEMS FOR SCALABLE DEDUPLICATION

      
Application Number US2020061912
Publication Number 2021/108344
Status In Force
Filing Date 2020-11-24
Publication Date 2021-06-03
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Yang, Yong
  • Zhang, Xianbo
  • Wu, Weibao
  • Lei, Chao
  • Wang, Yafeng
  • Wang, Haigang
  • Wei, Lulu

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include receiving a data object at an assigned node, determining whether the data object includes a sub-data object, and processing the sub-data object. The assigned node is a node of a plurality of nodes of a cluster, where the data object includes a data segment, and a signature. The signature is generated based, at least in part, on data of the data segment. The processing includes sending the sub-data object to a remote node. The remote node is another node of the plurality of nodes of the cluster.

IPC Classes  ?

  • G06F 16/174 - Redundancy elimination performed by the file system
  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors

8.

SYSTEMS AND METHODS FOR EFFICIENTLY BACKING UP LARGE DATASETS

      
Application Number US2020052294
Publication Number 2021/061831
Status In Force
Filing Date 2020-09-23
Publication Date 2021-04-01
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag

Abstract

A computer-implemented method for efficiently backing up large datasets may include (i) identifying data on an application server to be deduplicated by a deduplication server and then stored on a backup server, (ii) dividing the data into subsets, and (iii) for each subset of data subsequent to an initial subset of data, (a) transferring the subset of data to the deduplication server in response to detecting that a previous subset of data has completed transfer to the deduplication server, (b) deduplicating the subset of data in response to detecting that the previous subset of data has completed deduplication, and (c) transferring a deduplicated version of the subset of data to the backup server in response to detecting that the subset of data has completed deduplication and the previous subset of data has completed transfer to the backup server. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 16/174 - Redundancy elimination performed by the file system

9.

SYSTEMS AND METHODS FOR MARKING APPLICATION-CONSISTENT POINTS-IN-TIME

      
Application Number US2020049020
Publication Number 2021/046098
Status In Force
Filing Date 2020-09-02
Publication Date 2021-03-11
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dalal, Chirag
  • Bharadwaj, Vaijayanti
  • Kulkarni, Pradip

Abstract

The disclosed computer-implemented method for marking application-consistent points-in-time may include intercepting, by an I/O filter, a write request from a guest virtual machine to a virtual machine disk and queueing the write request in an I/O filter queue. The method may include sending the write request to the virtual machine disk and receiving a write completion message from the virtual machine disk. The method may also include sending, in response to the write completion message, the write request to an I/O daemon, and queueing the write request in an I/O daemon queue. The method may further include sending the write completion message to the guest virtual machine, and sending the write request to a backup gateway such that the backup gateway mimics writes to the virtual machine disk. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

10.

SYSTEMS AND METHODS FOR STORAGE BLOCK REPLICATION IN A HYBRID STORAGE ENVIRONMENT

      
Application Number US2020035863
Publication Number 2020/247455
Status In Force
Filing Date 2020-06-03
Publication Date 2020-12-10
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Kotkar, Vipul
  • Kabra, Reena
  • Banerjee, Anindya
  • Gohil, Jayesh
  • Machhar, Dhavalkumar

Abstract

The disclosed computer-implemented method for storage block replication in a hybrid storage environment may include receiving a request associated with a data source being replicated to modify a cloud object, storing an instruction for modifying the cloud object, determining that a replication operation for the source has completed, and modifying the cloud object and deleting the instruction for modifying the cloud object in response to determining that the replication operation has completed. In some examples, the request to modify the cloud object may include deleting the cloud object. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

11.

METHOD AND SYSTEM FOR IMPROVING EFFICIENCY IN THE MANAGEMENT OF DATA REFERENCES

      
Application Number US2020025954
Publication Number 2020/210085
Status In Force
Filing Date 2020-03-31
Publication Date 2020-10-15
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Xianbo
  • Liu, Jialun
  • Wu, Weibao

Abstract

Methods, computer program products, and computer systems for the management of data references in an efficient and effective manner are disclosed. Such methods, computer program products, and computer systems include receiving a change tracking stream at the computer system, identifying a data object group, and performing a deduplication management operation on the data object group. The change tracking stream is received from a client computing system. The change tracking stream identifies one or more changes made to a plurality of data objects of the client computing system. The identifying is based, at least in part, on at least a portion of the change tracking stream. The data object group represents the plurality of data objects.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

12.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO INFORMATION STORED IN AN INFORMATION RETENTION SYSTEM

      
Application Number US2019064065
Publication Number 2020/117711
Status In Force
Filing Date 2019-12-02
Publication Date 2020-06-11
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Ved, Amber

Abstract

The disclosed computer-implemented method for controlling access to information stored in an information retention system may include (1) receiving, at a computing device, metadata associated with an object type of respective objects, where at least two of the respective objects are in different domains, (2) determining, from the metadata, the respective object types of at least two objects, (3) forming a hierarchy of the at least two objects based on relative features of the respective object types, and (4) performing a security action comprising (A) receiving at least one access rule controlling access by at least one user to the at least two objects and (B) storing, in at least one storage device in the information retention system, the at least one access rule, the hierarchy of the objects, and the at least two objects. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots

13.

SYSTEMS AND METHODS FOR REBALANCING STRIPED INFORMATION ACROSS MULTIPLE STORAGE DEVICES

      
Application Number US2019029019
Publication Number 2019/210014
Status In Force
Filing Date 2019-04-24
Publication Date 2019-10-31
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Zagade, Prajakta

Abstract

The disclosed computer-implemented method for rebalancing striped information across multiple storage devices may include (1) allocating "Y" contiguous storage spaces on "Y" physical devices, (2) dividing, at the computing device, the "Y" continuous storage spaces into "N" subvolumes, (3) allocating the "N" subvolumes to "X" logical stripes, (4) allocating each of the first "Y" logical stripes to a respective physical stripe in each of the "Y" physical stripes, (5) distributing remaining subvolumes to respective logical stripes, and (6) allocating the respective subvolumes across the "Y" physical stripes. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

14.

SYSTEMS AND METHODS FOR DATA MANAGEMENT OF MULTIPLE CLOUD SERVICES

      
Application Number US2019025801
Publication Number 2019/195555
Status In Force
Filing Date 2019-04-04
Publication Date 2019-10-10
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Kasturi, Rohini
  • Grandhi, Satish
  • Dargude, Shailesh
  • Pratap, Vibhu
  • Rajaram, Vijay
  • Kavuri, Srinivas
  • Carter, Stuart
  • Singh, Yogendra

Abstract

The disclosed computer-implemented method for data management of multiple cloud services may include receiving, via a visibility application, a command for managing data hosted on a plurality of content sources. The commands from the visibility application may be modified and indirectly routed to the plurality of content sources. The method may include accessing, in response to the command, the plurality of content sources, and collecting and aggregating, from the plurality of content sources, metadata associated with the data. The method may also include analyzing the aggregated metadata. The method may further include providing, for presentation by the visibility application, results of the metadata analysis. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

15.

SYSTEMS AND METHODS FOR BACKING-UP AN EVENTUALLY-CONSISTENT DATABASE IN A PRODUCTION CLUSTER

      
Application Number US2019023474
Publication Number 2019/183423
Status In Force
Filing Date 2019-03-21
Publication Date 2019-09-26
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag
  • Sharma, Vinay

Abstract

The disclosed computer-implemented method for backing-up an eventually-consistent database in a production cluster may include (1) forming, on a production node, a stable copy of production data, (2) provisioning storage on a backup node based on an amount of data in the stable copy and a replication factor, (3) transferring information from the stable copy to a backup copy on the backup node, (4) performing record synthesis on the backup copy to merge record updates into complete backup records, (5) identifying and discarding any stale records and any redundant records in the complete backup records, and (6) transferring the complete backup records from the backup node to a cloud storage device. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

16.

SYSTEMS AND METHODS FOR DETECTING BIT ROT IN DISTRIBUTED STORAGE DEVICES HAVING FAILURE DOMAINS

      
Application Number US2019022609
Publication Number 2019/182914
Status In Force
Filing Date 2019-03-15
Publication Date 2019-09-26
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Gajbhiye, Sushrut
  • Barhate, Deodatta
  • Kolhe, Roshan
  • Marathe, Shailesh
  • Banerjee, Anindya

Abstract

The disclosed computer-implemented method for detecting bit rot in distributed storage devices having failure domains may include (1) receiving, at a computing device, a combination of data chunks created by adding, for each failure domain storing data chunks, data chunks from different stripes, (2) receiving a combination of parity chunks created by adding, for each failure domain storing parity chunks, parity chunks from the different stripes, (3) creating at least one new parity chunk from the combination of data chunks, and (4) identifying a presence of bit rot in the failure domains when the at least one new parity chunk does not match the combination of parity chunks. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens

17.

SYSTEMS AND METHODS FOR PERFORMING A DATABASE BACKUP FOR REPAIRLESS RESTORE

      
Application Number US2019019624
Publication Number 2019/168859
Status In Force
Filing Date 2019-02-26
Publication Date 2019-09-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dalal, Chirag
  • Bharadwaj, Vaijayanti

Abstract

The disclosed computer-implemented method for performing a database backup for repairless restore may include (1) receiving replica data records representing copies of a database from each of a group of data storage nodes in a production cluster, (2) processing the replica data records in parallel without inter-node communication between the data storage nodes, (3) merging updates to the replica data records, (4) identifying stale or redundant data records in the updated replica data records, (5) discarding the stale or redundant data records from the updated replica data records to create a single copy of updated data records, and (6) restoring the copy of the updated data records to the production cluster by replicating the updated data records to the data storage nodes such that each of the updated data records is consistent thereby obviating subsequent repair. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

18.

SYSTEMS AND METHODS FOR RUNNING APPLICATIONS ON A MULTI-TENANT CONTAINER PLATFORM

      
Application Number US2019019798
Publication Number 2019/168957
Status In Force
Filing Date 2019-02-27
Publication Date 2019-09-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Goel, Vikas

Abstract

The disclosed computer-implemented method for running applications on a multi-tenant container platform may include (1) receiving, at a host administrator service on a container host computing device and via a host administrator service socket handle, a request for a privileged operation from an application running in a non-privileged container, (2) performing, based on a user identifier of the application, a security check of a user associated with the application, (3) comparing, when the security check results in approval, a process identifier of the requested privileged operation against a whitelist of permitted operations to determine the requested privileged operation is permissible, and (4) initiating running, when the requested privileged operation is permissible, the requested privileged operation. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

19.

SYSTEMS AND METHODS FOR UPDATING CONTAINERS

      
Application Number US2019015740
Publication Number 2019/152442
Status In Force
Filing Date 2019-01-29
Publication Date 2019-08-08
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Goel, Vikas

Abstract

The disclosed computer-implemented method for updating containers may include (i) identifying an application container that is instantiated from a static application container image, (ii) identifying ancillary code that is designed to modify execution of the application executing in the application container, (iii) packaging the ancillary code into a data volume container image to be deployed to the host system that hosts the application container, (iv) discovering, by the application container, a data volume container instantiated from the data volume container image on the host system, and (v) modifying, by the application container, the execution of the application executing in the application container with the ancillary code, without modifying the static application container image, at least in part by instantiating the application container with a pointer to the location of the data volume container that contains the ancillary code. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

20.

PERFORMING BACKUP OPERATIONS USING REPLICAS

      
Application Number US2018062744
Publication Number 2019/108587
Status In Force
Filing Date 2018-11-28
Publication Date 2019-06-06
Owner VERITAS TECHNOLOGIES, LLC (USA)
Inventor Sridharan, Srineet

Abstract

Disclosed herein are methods, systems, and processes to perform backup operations using replicas. A replica of a virtual machine is created as part of a replication operation. The replica includes data associated with the virtual machine and metadata associated with applications executing on the virtual machine. A backup operation generates a backup image from the replica using the metadata.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

21.

SYSTEMS AND METHODS FOR LOAD BALANCING BACKUP DATA

      
Application Number US2018031430
Publication Number 2018/213051
Status In Force
Filing Date 2018-05-07
Publication Date 2018-11-22
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Paulzagade, Sudhakar
  • Kulkarni, Pradip

Abstract

The disclosed computer-implemented method for load balancing backup data may include (1) receiving a request to backup files in a multi-node computing cluster, (2) identifying a backup distribution of the files among multiple backup clients, (3) reading an initial data block of a current file from a data node in the cluster, (4) reading a copy of the initial data block of an additional file from another data node in the cluster, (5) reading a subsequent data block of the current file from the data node in the cluster, and (6) balancing backup of the current and additional files among the data node and the another data node by reading a copy of a subsequent backup data block of the additional file from the another data node in the multi-node computing cluster. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

22.

IMPROVING BACKUP PERFORMANCE AFTER BACKUP FAILURE

      
Application Number US2018029523
Publication Number 2018/200778
Status In Force
Filing Date 2018-04-26
Publication Date 2018-11-01
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Shuangmin
  • Yan, Yongguo
  • Zhang, Xianbo
  • Li, Kai
  • Wu, Weibao
  • Li, Shengzhao

Abstract

Disclosed herein are methods, systems, and processes to improve backup performance after backup failure. It is determined whether a backup operation is successful. In response to a determination that the backup operation was unsuccessful, backup metadata associated with the backup operation is replaced with snapshot metadata associated with a snapshot that is taken at a first point in time that is prior to initiation of the backup operation. A rolled-back snapshot that permits another backup operation to be performed at a second point in time based on the snapshot metadata is then generated.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

23.

SYSTEMS AND METHODS FOR REDUCING DATA FRAGMENTATION

      
Application Number US2018027672
Publication Number 2018/194938
Status In Force
Filing Date 2018-04-13
Publication Date 2018-10-25
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Shuangmin
  • Li, Shengzhao
  • Zhang, Xianbo
  • Li, Kai
  • Wu, Weibao

Abstract

The disclosed computer-implemented method for reducing data fragmentation may include (1) identifying update data which updates an initial data set; (2) categorizing, using a database manager, the update data based on how the update data is expected to impact digital storage device resources; (3) storing the update data in a physical storage device in a physical order based on the category of the update data; and (4) updating, after storing the update data, an extent map indicating a mapping of logical locations of the update data to physical locations at which the update data is stored. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 3/06 - Digital input from, or digital output to, record carriers

24.

INPUT/OUTPUT(I/O) FENCING WITHOUT DEDICATED ARBITRATORS

      
Application Number US2018025232
Publication Number 2018/183733
Status In Force
Filing Date 2018-03-29
Publication Date 2018-10-04
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Goel, Vikas
  • Gahlot, Jai
  • Marathe, Shailesh
  • Toley, Abhijit
  • Singh, Narendra

Abstract

Disclosed herein are methods, systems, and processes to perform input/output (I/O) fencing without dedicated arbitrators. A coordination storage identifier is stored in a storage device as metadata. The coordination storage identifier is associated with a node of a cluster coupled to the storage device, and an I/O fencing operation is performed using the coordination storage identifier.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

25.

SYSTEM AND METHOD TO PROPAGATE INFORMATION ACROSS A CONNECTED SET OF ENTITIES IRRESPECTIVE OF THE SPECIFIC ENTITY TYPE

      
Application Number US2018016064
Publication Number 2018/144492
Status In Force
Filing Date 2018-01-31
Publication Date 2018-08-09
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bandopadhyay, Tushar
  • Dighe, Bharat

Abstract

Various systems and methods are provided for propagating information throughout a data center or other network environment. For instance, in certain embodiments, the functionality disclosed herein includes determines propagation rules, and then either stores and/or propagates those rules throughout the datacenter or other network environment. Propagation rules define various conditions or other variables that govern propagation of information throughout a system, such as those systems described herein. The propagation rules can then be used to perform various other functionality. For instance, the functionality described herein can be used to process updates to entities. The functionality described herein can also be used to process updates to propagation metadata. Additionally, the functionality described herein can be used to process the creation of new relationships. The functionality described herein can also be used to process the deletion of objects and/or relationships. All of the foregoing functionality can be performed automatically.

IPC Classes  ?

26.

METHOD AND SYSTEM FOR DEPENDENCY ANALYSIS OF WORKLOADS FOR ORCHESTRATION

      
Application Number US2018015697
Publication Number 2018/144377
Status In Force
Filing Date 2018-01-29
Publication Date 2018-08-09
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bandopadhyay, Tushar
  • Dighe, Bharat

Abstract

Methods, computer program products, computer systems, and the like providing for representation and analysis of entities and their relationships are disclosed. The method, for example, includes selecting a node of a plurality of nodes in a property graph, analyzing entity information associated with the node, and, in response to the analyzing, storing the entity information in dependency information. Each node of the plurality of nodes represents an entity of a plurality of entities, and is coupled to at least one other node of the plurality of nodes by one or more links of a plurality of links of the property graph. Each of the one or more links represents a relationship between the each node and the at least one other node. The entity information is information regarding the entity. The dependency information is configured to facilitate orchestration of one or more of the plurality of entities.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

27.

SYSTEMS AND METHODS FOR PERFORMING SECURE BACKUP OPERATIONS

      
Application Number US2017062398
Publication Number 2018/094268
Status In Force
Filing Date 2017-11-17
Publication Date 2018-05-24
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Agrawal, Mukund
  • Malhotra, Gaurav
  • Kumar, Vikas
  • Tanksale, Nachiket

Abstract

The disclosed computer-implemented method for performing secure backup operations may include (i) identifying a group of backup servers with heterogeneous computing environments that provide backup services for a backup client, (ii) determining, for each backup server within the group, a trust level of the backup server by identifying at least one security characteristic of the backup server, (iii) deploying, on each of the backup servers, a signed certificate that enables the backup server to transfer backup data with a security level that corresponds to the trust level of the backup server, and (iv) performing secure backup operations for the backup client by (a) identifying a sensitivity level of a backup task initiated by the backup client and (b) assigning the backup task to a backup server within the group of backup servers that has a signed certificate with a security level appropriate for the sensitivity level of the backup task.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

28.

SYSTEMS AND METHODS FOR ALLOCATING INPUT/OUTPUT BANDWIDTH IN STORAGE SYSTEMS

      
Application Number US2017058525
Publication Number 2018/081421
Status In Force
Filing Date 2017-10-26
Publication Date 2018-05-03
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Paulzagade, Sudhakar
  • Wakhare, Prasanna
  • Pendharkar, Niranjan

Abstract

The disclosed computer-implemented method for allocating input/output bandwidth in storage systems may include (1) allocating, in accordance with a pre-defined service-level agreement, an assigned amount of input/output bandwidth to an application that performs actions on a storage system, (2) receiving a request from the application to perform an input/output operation on the storage system, (3) identifying an amount of latency associated with fulfilling the input/output operation, (4) calculating, based at least in part on the amount of latency associated with fulfilling the input/output operation, an amount of input/output bandwidth consumed by the input/output operation, (5) deducting the amount of input/output bandwidth consumed by the input/output operation from the assigned amount of input/output bandwidth allocated to the application, and (6) allocating bandwidth to future input/output requests from the application from the remaining amount of input/output bandwidth allocated to the application. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • H04L 12/873 - Bandwidth-aware scheduling
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation

29.

TRACKING ACCESS PATTERN OF INODES AND PRE-FETCHING INODES

      
Application Number US2017053990
Publication Number 2018/064319
Status In Force
Filing Date 2017-09-28
Publication Date 2018-04-05
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patel, Bhautik
  • James, Freddy
  • Kothari, Mitul
  • Banerjee, Anindya

Abstract

Disclosed herein are methods, systems, and processes to track access patterns of inodes, and to issue read-ahead instructions to pre-fetch inodes into memory. A location of a unit of metadata in a metadata storage area is determined. Another location in the metadata storage area that corresponds to a current metadata read operation is determined. Whether a metadata read-ahead operation can be performed is determined using the location of the unit of metadata and the another location. In response to a determination that the metadata read-ahead operation can be performed, the metadata-ahead operation is issued. In addition, an inode is accessed and a directory of the inode is determined. Also determined is whether an entry for the directory exists in a global inode list. If the entry exists in the global inode list, whether a file structure of the directory is sequential or non-sequential is determined. If the entry does not exist in the global inode list, a new entry for the directory is added in the global inode list.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch

30.

SYSTEMS AND METHODS FOR HEALING IMAGES IN DEDUPLICATION STORAGE

      
Application Number CN2016100855
Publication Number 2018/058446
Status In Force
Filing Date 2016-09-29
Publication Date 2018-04-05
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Liu, Bin
  • Zhang, Xianbo
  • Cheng, Shuai
  • Shan, Cheng
  • Jiang, Wenfeng

Abstract

The disclosed computer-implemented method for healing images in deduplication storage may include (1) detecting that a data segment stored within deduplication storage is corrupted by executing an algorithm on the data segment to generate a numerical identifier for the data segment and determining that the numerical identifier does not match a previously stored numerical identifier for the data segment, (2) checking, during a backup operation, whether a digital fingerprint of a data segment of an image being backed up matches a digital fingerprint of the corrupted data segment that was taken prior to corruption and that is already stored within the deduplication storage, and (3) appending the data segment from the image being backed up to a container that already contains the corrupted data segment rather than replacing the corrupted data segment. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

31.

SYSTEMS AND METHODS FOR PERFORMING LIVE MIGRATIONS OF SOFTWARE CONTAINERS

      
Application Number US2017048163
Publication Number 2018/048628
Status In Force
Filing Date 2017-08-23
Publication Date 2018-03-15
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Makin, Gaurav
  • Kantor, Kody
  • Wen, Hao
  • Cao, Zhichao
  • Mehta, Vallari

Abstract

The disclosed computer-implemented method for performing live migrations of software containers may include (i) identifying a request to migrate a software container from a source computing system to a target computing system while a process executes within the software container, (ii) creating a checkpoint of the process in execution (iii) transferring the checkpoint to the target computing system, (iv) updating the checkpoint recurrently by recurrently creating an incremental checkpoint of the process and merging the incremental checkpoint into the checkpoint, (v) predicting, before updating the checkpoint with an iteration of the incremental checkpoint and based on a size of the iteration of the incremental checkpoint, that finalizing a migration of the software container to the target computing system would meet a predetermined time objective, and (vi) finalizing the migration of the software container to the target computing system. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

32.

IMPROVING THROUGHPUT IN OPENFABRICS ENVIRONMENTS

      
Application Number US2017033951
Publication Number 2017/210015
Status In Force
Filing Date 2017-05-23
Publication Date 2017-12-07
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Joshi, Adhiraj
  • Toley, Abhijit

Abstract

Disclosed herein are systems, methods, and processes to improve throughput in OpenFabrics and Remote Direct Memory Access (RDMA) computing environments. Data and a header is received. Buffers in which the data and the header are to be written are identified. Placement information for the data and the header is determined based on a size of each buffer, a page-boundary-alignment of the data, and a header alignment of the header. The data and the header are written to the buffer(s) using the placement information. In such computing environments, throughout can be improved by writing data on page boundaries and the header on a header boundary in a second to last buffer.

IPC Classes  ?

  • G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal

33.

REPLICATION BETWEEN HETEROGENEOUS STORAGE SYSTEMS

      
Application Number US2017024670
Publication Number 2017/172863
Status In Force
Filing Date 2017-03-29
Publication Date 2017-10-05
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Xianbo
  • Wu, Weibao
  • Stevens, Timothy
  • Zhang, Shuangmin

Abstract

Disclosed herein are systems, methods, and processes to perform replication between heterogeneous storage systems. Information associated with a backup stream is recorded during a backup operation by a source server and includes instructions. The instructions include an include instruction to include existing data and a write instruction to write new data during a replication operation. A request to perform the replication operation is received. In response to the request, the information is sent to a target server as part of performing the replication operation.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

34.

ADJUSTING REPLICAITON OPERATIONS IN A DISTRIBUTED ENVIRONMENT

      
Application Number US2017015227
Publication Number 2017/132437
Status In Force
Filing Date 2017-01-27
Publication Date 2017-08-03
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Doshi, Tushar
  • Vaidya, Anish
  • Shah, Kushal

Abstract

Disclosed herein are methods, systems, and processes to adjust replication operations in a distributed environment. A set of replicated data is received from a first appliance as a result of a replication operation. The replication operation is initiated by the first appliance and the set of replicated data includes a first timestamp. A write operation is performed to store the set of replicated data and a second timestamp is recorded. Recovery point information is generated based on the first timestamp and the second timestamp. The recovery point information is configured to be utilized in adjusting replication parameters of a subsequent replication operation.

IPC Classes  ?

  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/30 - Monitoring

35.

SECURING INTERNAL SERVICES IN AN APPLIANCE

      
Application Number US2017015231
Publication Number 2017/132440
Status In Force
Filing Date 2017-01-27
Publication Date 2017-08-03
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Goel, Vikas

Abstract

Disclosed herein are methods, systems, and processes to secure internal services in an appliance. A service call initiated by a client process of a client is intercepted. The service call is a request for an internal service provided by a server. The client and the server are deployed in an appliance. The service call includes an identifier, and the identifier identifies the internal service. If one or more rules are specified for the identifier, attribute(s) of at least one specified and/or defined rule are processed. The service call is then forwarded to the server if the processing indicates that the forwarding the service call is allowable.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

36.

SECURING INTERNAL SERVICES IN A DISTRIBUTED ENVIRONMENT

      
Application Number US2017015233
Publication Number 2017/132442
Status In Force
Filing Date 2017-01-27
Publication Date 2017-08-03
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Goel, Vikas

Abstract

Disclosed herein are methods, systems, and processes to secure internal services in a distributed environment. A service call initiated by a client process of a client is intercepted. In this example, the service call is a request for an internal service provided by a server deployed in a target appliance. The client is deployed in a source appliance. The service call includes an identifier, and the identifier identifies the internal service. If one or more rules are specified for the identifier, a service packet is generated by multiplexing client information associated with the client process as well as information in the service call. The service packet is forwarded to the target appliance.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

37.

SYSTEMS AND METHODS FOR BACKING UP LARGE DISTRIBUTED SCALE-OUT DATA SYSTEMS

      
Application Number US2016064040
Publication Number 2017/116593
Status In Force
Filing Date 2016-11-29
Publication Date 2017-07-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Sridharan, Srineet

Abstract

A computer-implemented method for backing up large distributed scale-out data systems may include (1) identifying a backup job to be performed on a distributed scale-out storage system that presents a unified storage view, (2) determining, in response to the backup job applying to distributed scale-out storage and based on a scope of the backup job, a number of backup systems to deploy for performing the backup job, (3) deploying a plurality of backup systems creating a plurality of backups covering the plurality of data objects by (i) assigning, to each backup system, a subset of data objects within the backup job and (ii) backing up, by the backup system, the subset of data objects assigned to the backup system, and (4) combining the plurality of backups into a unified backup that represents the unified storage view. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

38.

SYSTEMS AND METHODS FOR EFFICIENTLY CLASSIFYING DATA OBJECTS

      
Application Number US2016064041
Publication Number 2017/116594
Status In Force
Filing Date 2016-11-29
Publication Date 2017-07-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Thomas, Huw

Abstract

The disclosed computer-implemented method for efficiently classifying data objects may include (1) receiving a data object to be classified according to a group of rules, where each rule includes one or more clauses, (2) creating, for each rule, a rule evaluation job that directs a rule evaluation processor to evaluate the data object according to the clauses within the rule, where the rule evaluation processor evaluates the clauses in increasing order of estimated processing time, (3) submitting the rule evaluation jobs created for the rules to rule evaluation queues for processing by the rule evaluation processor, where the rule evaluation jobs are submitted in decreasing order of estimated processing time, (4) receiving an evaluation result for each rule evaluation job, and (5) in response to receiving the evaluation results, classifying the data object according to the evaluation results. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

39.

METHOD FOR FLASH-FRIENDLY CACHING FOR CDM WORKLOADS

      
Application Number US2016068013
Publication Number 2017/112765
Status In Force
Filing Date 2016-12-21
Publication Date 2017-06-29
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dalal, Chirag
  • Bharadwaj, Vaijayanti

Abstract

A processor-based method for flash-friendly caching is provided. The method includes reading data from a first memory and writing the data to a second memory, in a cache. The method includes performing an aligned block write of data from the second memory in the cache to a flash memory in the cache, responsive to accumulating sufficient data for the aligned block write.

IPC Classes  ?

  • G06F 12/0895 - Caches characterised by their organisation or structure of parts of caches, e.g. directory or tag array

40.

SYSTEMS AND METHODS FOR TAKING SNAPSHOTS IN A DEDUPLICATED VIRTUAL FILE SYSTEM

      
Application Number US2016063324
Publication Number 2017/091573
Status In Force
Filing Date 2016-11-22
Publication Date 2017-06-01
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Xianbo
  • Wang, Haigang
  • Zhang, Shuangmin
  • Van Voorst, Jeffrey
  • Wu, Weibao
  • Kulkarni, Sameer
  • Joshi, Nilesh
  • Li, Kai
  • Yang, Yun
  • Brons, Scott

Abstract

A computer-implemented method for taking snapshots in a deduplicated virtual file system may include (1) maintaining a deduplicated virtual file system that stores, at an original location within a non-virtual file system, at least one configuration file storing metadata for a target file and an extent map for the target file, the extent map defining how to construct the target file from deduplicated data segments in a deduplicated storage system, (2) receiving a request to take a snapshot of the target file corresponding to the configuration file, (3) copying the configuration file storing metadata for the target file and the extent map for the target file into a snapshot location within the non-virtual file system, and (4) transmitting a file reference request to the deduplicated storage system to add a file reference within the deduplicated storage system. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

41.

SYSTEMS AND METHODS FOR COORDINATING DATA CACHING ON VIRTUAL STORAGE APPLIANCES

      
Application Number US2016061007
Publication Number 2017/083313
Status In Force
Filing Date 2016-11-08
Publication Date 2017-05-18
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag

Abstract

A computer-implemented method for coordinating data caching on virtual storage appliances may include (1) receiving, at a first virtual storage appliance, a request for data from a virtual machine in a first set of virtual machines served by the first virtual storage appliance; (2) determining that the requested data is not cached at the first virtual storage appliance, (3) determining that a second virtual storage appliance is responsible for caching the requested data from a remote data source, (4) transferring the requested data from the second virtual storage appliance to the first virtual storage appliance, and (5) providing the requested data from the first virtual storage appliance to the virtual machine. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

42.

SYSTEMS AND METHODS FOR RESTORING DATA FROM OPAQUE DATA BACKUP STREAMS

      
Application Number US2016053848
Publication Number 2017/058736
Status In Force
Filing Date 2016-09-26
Publication Date 2017-04-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Paulzagade, Sudhakar
  • Anand, Nitin
  • Jain, Saurabh

Abstract

The disclosed computer-implemented method for restoring data from opaque data backup streams may include (1) initiating a virtual restore of an opaque data backup stream that is designed to be parsed exclusively by a data backup application that created the stream, (2) determining, for each block of data, an original header and tail of the block based on a restored version of the block on the client, (3) sending the original header and tail of the block to a server, (4) creating, at the server, a mapping between a location of the block of data in the stream on the server and the original header and tail of the block, and (5) restoring, without using the data backup application, data in the stream by using the mapping to restore the original headers and tails of the blocks. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

43.

INPUT/OUTPUT FENCING OPTIMIZATION

      
Application Number US2016054306
Publication Number 2017/058989
Status In Force
Filing Date 2016-09-29
Publication Date 2017-04-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Gahlot, Jai
  • Katkar, Amol, S.
  • Das, Udipta
  • Peshwe, Pranav

Abstract

Various systems, methods, and processes to optimize input/output (I/O) fencing operations in systems that implement coordination points are presented. A matrix is generated. The matrix includes information indicating the accessibility of one or more coordination points by a node. The method then transmits the matrix to one or more other nodes. In addition, in response to determining that a node is no longer part of a sub-cluster, another node in the sub- cluster is designated as a racer node. The racer node accesses a matrix, and the matrix includes information to determine whether a majority of coordination points in a cluster are accessible by nodes in the sub-cluster. Based on the accessing, a determination is made that the information indicates that the majority of coordination points are accessible by the nodes. The information is then broadcasted. Further, in response to a cluster being partitioned into multiple network partitions, a determination is made, using a first node in a first network partition, whether the first node wins one or more coordination points. The determination of the first node is then transmitted to a second node in the first network partition. Further, another determination is made using the second node whether the second node wins one or more other coordination points other than the one or more coordination points won by the first node.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

44.

SINGLE SIGN-ON METHOD FOR APPLIANCE SECURE SHELL

      
Application Number US2016055084
Publication Number 2017/059400
Status In Force
Filing Date 2016-10-01
Publication Date 2017-04-06
Owner VERITAS TECHNOLOGIES LLC. (USA)
Inventor
  • Goel, Vikas
  • Koeten, Robert

Abstract

A system and method for efficiently establishing a secure shell connection for accessing Web resources. A user attempts to establish a secure Hypertext Transfer Protocol (HTTP) session between a client computing device and a remote storage device. The storage device redirects the Web browser of the client computing device to a single sign-on (SSO) third-party identity provider for authorizing the user. After successful authorization, the client computing device receives information to use to maintain a secure HTTP session. This information is stored on the storage device. The user attempts to establish a text-based secure shell session. The user is not prompted for login credentials. However, the user is authenticated using the previously stored information and a text-based secure shell session is established.

IPC Classes  ?

  • G06F 21/33 - User authentication using certificates
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

45.

SYSTEMS AND METHODS FOR PROVISIONING FREQUENTLY USED IMAGE SEGMENTS FROM CACHES

      
Application Number US2016051170
Publication Number 2017/048603
Status In Force
Filing Date 2016-09-09
Publication Date 2017-03-23
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Yang, Yong
  • Wu, Weibao

Abstract

The disclosed computer-implemented method for provisioning frequently used image segments from caches may include (1) storing a representation and a use counter for an image segment that is hosted on a storage system in a list of representations and use counters for image segments hosted on the storage system, (2) incrementing a current value of the use counter for the image segment in the list of representations and use counters each time the image segment is provisioned from the storage system, (3) determining that the current value of the use counter for the image segment has met a predetermined threshold for frequent image-segment provisioning, (4) hosting the image segment in a cache that enables quicker provisioning than the storage system enables, and (5) provisioning the image segment from the cache in response to a request to provision the image segment. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

46.

OPTIMIZING ACCESS TO PRODUCTION DATA

      
Application Number US2016050755
Publication Number 2017/044612
Status In Force
Filing Date 2016-09-08
Publication Date 2017-03-16
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dalal, Chirag
  • Bharadwaj, Vaijayanti

Abstract

Various systems, methods, and processes for optimizing access to production data in application development and testing environments are disclosed. If an input/output (I/O) operation is a read operation, a storage location on a virtual storage unit at which the read operation is to be performed is determined. Also determined is whether an earlier write operation was performed at the storage location. If an earlier write operation was performed at the storage location, the read operation is performed on one or more virtual data files. However, if the earlier write operation was not performed at the storage location, the read operation is performed on allocated storage space.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems

47.

SYSTEMS AND METHODS FOR SCALABLE NETWORK BUFFER MANAGEMENT

      
Application Number US2016040856
Publication Number 2017/007731
Status In Force
Filing Date 2016-07-01
Publication Date 2017-01-12
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Agrawal, Mukund
  • Dravid, Sachin
  • Patil, Deepak

Abstract

The disclosed computer-implemented method for scalable network buffer management may include (1) receiving, via a connection to a client, data to be transmitted to a cloud service, (2) buffering the data in at least one data buffer, (3) determining that the data will not be transmitted to the cloud service within a timeout period for the client connection, (4) delaying reception of additional data from the client connection for a portion of the timeout period, and (5) before the timeout period has elapsed, buffering data from the client connection in at least one secondary data buffer, wherein the secondary data buffer is smaller in size than the data buffer. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • H04L 12/801 - Flow control or congestion control
  • H04L 12/861 - Packet buffering or queuing arrangements; Queue scheduling

48.

DATA ACCESS ACCELERATOR

      
Application Number US2016040367
Publication Number 2017/004361
Status In Force
Filing Date 2016-06-30
Publication Date 2017-01-05
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dalal, Chirag
  • Bharadwaj, Vaijayanti

Abstract

Various systems, methods, and processes for accelerating data access in application and testing environments are disclosed. A production dataset is received from a storage system, and cached in a consolidated cache. The consolidated cache is implemented by an accelerator virtual machine. A file system client intercepts a request for the production dataset from one or more application virtual machines, and transmits the request to the accelerator virtual machine. The accelerator virtual machine serves the production dataset to the one or more application virtual machines from the consolidated cache.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems

49.

SYSTEM AND METHOD FOR CENTRALIZED CONFIGURATION AND AUTHENTICATION

      
Application Number US2016038835
Publication Number 2016/210013
Status In Force
Filing Date 2016-06-23
Publication Date 2016-12-29
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Goel, Vikas

Abstract

A system and method for efficiently obtaining user configuration information for a given device. Multiple devices are deployed in an environment and may be storage appliances. A directory service and an authentication service may be used to determine whether a login session attempt on a deployed device is successful. An identity and access manager (IAM) is used to for this determination and to communicate with the directory service and the authentication service. A device of the one or more of the deployed devices does not store user configuration information. Responsive to an attempted login by a user, the device mimics the existence of the user and generates a request for directory lookup and authentication for the user which is conveyed to an external device. If a positive response is received in response to the request, the user is permitted to login to the device and a session is created for the user.

IPC Classes  ?

50.

SYSTEMS AND METHODS FOR IMPROVING QUALITY OF SERVICE WITHIN HYBRID STORAGE SYSTEMS

      
Application Number US2016024589
Publication Number 2016/160743
Status In Force
Filing Date 2016-03-28
Publication Date 2016-10-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Wakhare, Prasanna
  • Pendharkar, Niranjan

Abstract

The disclosed computer-implemented method for improving quality of service within hybrid storage systems may include (1) monitoring a performance measurement of a hybrid storage system that includes first and second types of storage devices that handle I/O throughput in connection with an application, (2) determining, based at least in part on the monitored performance measurement, an approximate amount of the I/O throughput handled by the first type of storage device over a period of time, (3) determining, based at least in part on the approximate amount of I/O throughput, a rate at which the application is allowed to deliver subsequent I/O throughput to the hybrid storage system over a subsequent period of time, and then (4) regulating, based at least in part on the rate, the subsequent I/O throughput in connection with the application over the subsequent period of time. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

51.

TECHNIQUES FOR DATA BACKUP AND RESTORATION

      
Application Number US2015065955
Publication Number 2016/100427
Status In Force
Filing Date 2015-12-16
Publication Date 2016-06-23
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Sun, Dongxu
  • Zhu, Cheng, Hai
  • Shan, Cheng
  • She, Haibin
  • Zhang, Xianbo

Abstract

Techniques for data backup and restoration are disclosed. In one embodiment, the techniques may be realized as a method including generating a first backup representing a database at a first time; after the first backup, generating a plurality of journal entries, each journal entry representing a change to the database made after the first time; and restoring the database from the first backup and the plurality of journal entries, the restored database including the changes represented by the entries.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 12/16 - Protection against loss of memory contents

52.

SYSTEMS AND METHODS FOR AGGREGATING INFORMATION-ASSET CLASSIFICATIONS

      
Application Number US2015059744
Publication Number 2016/077230
Status In Force
Filing Date 2015-11-09
Publication Date 2016-05-19
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Koeten, Robert

Abstract

The disclosed computer-implemented method for aggregating information-asset classifications may include (1) identifying a data collection that includes two or more information assets, (2) identifying a classification for each of the information assets, (3) deriving, based at least in part on the classifications of the information assets, an aggregate classification for the data collection, and (4) associating the aggregate classification with the data collection to enable a data management system to enforce a data management policy based on the aggregate classification. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

53.

SYSTEM AND METHOD FOR OPTIMIZING TRANSPORTATION OVER NETWORKS

      
Application Number US2015057429
Publication Number 2016/069503
Status In Force
Filing Date 2015-10-27
Publication Date 2016-05-06
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Jia, Yingsong
  • Guan, Hongxing
  • Jin, Xinbao

Abstract

A system and method for efficient transfer of data over a network. A data source and a destination are coupled to one another via a network. The data source is configured to transmit data to the destination and determine a network latency associated with the transmission. In response to determining a first transmission parameter may not be optimized, the source is configured to modify the first transmission parameter and evaluate its effect on data throughput. The source may repeat such modifications as long as throughput is increased. Once the first transmission parameter is deemed optimized, the source may perform a similar procedure for a second transmission parameter. In various embodiments, the first transmission parameter may correspond to a packet size and the second transmission parameter may correspond to a number of streams being processed by the source.

IPC Classes  ?

  • H04L 12/805 - Determination of the optimum packet size, e.g. maximum transmission unit [MTU]

54.

SYSTEMS AND METHODS FOR AGGREGATING INFORMATION-ASSET METADATA FROM MULTIPLE DISPARATE DATA-MANAGEMENT SYSTEMS

      
Application Number US2015028669
Publication Number 2015/171434
Status In Force
Filing Date 2015-04-30
Publication Date 2015-11-12
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Vranyes, Steve A.
  • Carter, Stuart
  • Dickson, Christopher M.
  • Koeten, Robert

Abstract

A computer-implemented method for aggregating information- asset metadata from multiple disparate data-management systems which may include (1) receiving a first instance of metadata of an information asset from a first data-management system that manages information assets of an entity in a first domain, (2) receiving a second instance of metadata of the information asset from a second data-management system that manages the information assets of the entity in a second domain that is separate and distinct from the first domain, (3) storing the first and second instances of metadata in a global metadata repository that is separate and distinct from the first and second data-management systems, and (4) providing access to the first and second instances of metadata stored in the global metadata repository to the first data-management system, the second data-management system, and/or the entity.

IPC Classes  ?